Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
87d714fc088e37880f5f332c86692344.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87d714fc088e37880f5f332c86692344.exe
Resource
win10v2004-20231215-en
General
-
Target
87d714fc088e37880f5f332c86692344.exe
-
Size
82KB
-
MD5
87d714fc088e37880f5f332c86692344
-
SHA1
01f10b0144ee3f0998b5b80e8412e87cb23b0803
-
SHA256
9611b8907be727e6d5614bfc97170d2aa99d0242a2f93bea75db303c1e13cc84
-
SHA512
ba9733ae21380d771c980e85d9f1429caf79eb5c19f5652cc122d826ad6f1e56caf9b909a6f482167f40d5e4d8319ff2ee9e74bcf91f5cf258d124bdb832fb3b
-
SSDEEP
1536:rnf9PbnUaVm9PeM/1BucW+Om3hZRaOYQioZgwasK5P5A:jVMGa1BuQ3L0rQlZgwyt2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 87d714fc088e37880f5f332c86692344.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 87d714fc088e37880f5f332c86692344.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 87d714fc088e37880f5f332c86692344.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 87d714fc088e37880f5f332c86692344.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 87d714fc088e37880f5f332c86692344.exe 2088 87d714fc088e37880f5f332c86692344.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2088 2372 87d714fc088e37880f5f332c86692344.exe 29 PID 2372 wrote to memory of 2088 2372 87d714fc088e37880f5f332c86692344.exe 29 PID 2372 wrote to memory of 2088 2372 87d714fc088e37880f5f332c86692344.exe 29 PID 2372 wrote to memory of 2088 2372 87d714fc088e37880f5f332c86692344.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d714fc088e37880f5f332c86692344.exe"C:\Users\Admin\AppData\Local\Temp\87d714fc088e37880f5f332c86692344.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\87d714fc088e37880f5f332c86692344.exeC:\Users\Admin\AppData\Local\Temp\87d714fc088e37880f5f332c86692344.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f6b0a778927b3f9f7e28ae0b97b54b8f
SHA1f732a7a5a42151f2de95a1ae23193be6e70c77b0
SHA256031c82d1848652ee2fd17e8fe35f9a7e713d4d41d9c483a87e8ec04c2337b4fe
SHA512839c13a95cb997eba60f8ec153ed027c1b295b582fb5b9d87ed5896930ed5457c4843948d745215ea6a7bcd7a01f40b973011ad857137a86674d184ba58013b0